2017
DOI: 10.1002/ecj.12012
|View full text |Cite
|
Sign up to set email alerts
|

Double‐Rounds–Driven Electromagnetic Analysis Attack for a Lightweight Block Cipher Simeck and its Evaluation

Abstract: Since Internet of Things (IoT) has been widely used, embedded devices have the risk of illegal attacks. Therefore, lightweight block ciphers, which can be implemented on embedded devices in small area, have attracted attention as the countermeasure. Simeck is a new lightweight block cipher that can be implemented in the smallest area among lightweight block ciphers. Recently, regarding the security of a cryptographic circuit, the risk of electromagnetic analysis attack has been reported. However, no study of e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…They conducted random bit-flip fault attacks (requiring n/2 faults to recover the n-bit last round key) and a random byte fault attack (needing n/6.5 faults to recover the n-bit last round key) on Simeck. Nozaki et al [16] proposed a double-round-driven electromagnetic analysis attack on Simeck FPGA implementation.…”
Section: Simeck Family Blockmentioning
confidence: 99%
See 1 more Smart Citation
“…They conducted random bit-flip fault attacks (requiring n/2 faults to recover the n-bit last round key) and a random byte fault attack (needing n/6.5 faults to recover the n-bit last round key) on Simeck. Nozaki et al [16] proposed a double-round-driven electromagnetic analysis attack on Simeck FPGA implementation.…”
Section: Simeck Family Blockmentioning
confidence: 99%
“…In the HIPAA Compliance Guide [1], the service provider must use data encryption on portable devices and computer networks during secure PHI (protected health information) transmission and storage processes. However, various types of devices, such as 8-bit, 16-bit, and 32-bit IoT devices as well as communication protocols such as Bluetooth and Wi-Fi, are used to provide human care services. These IoT devices for human care services operate in a resource-constrained environment.…”
Section: Introductionmentioning
confidence: 99%